{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T20:14:47.555402900Z","vulnerabilities":[{"cve":{"id":"CVE-2023-28121","sourceIdentifier":"support@hackerone.com","published":"2023-04-12T21:15:28.057","lastModified":"2024-11-21T07:54:26.807","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"support@hackerone.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woocommerce_payments:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"4.8.0","versionEndExcluding":"4.8.2","matchCriteriaId":"FE70E8AE-CFBB-4575-A340-DBD17C3CE853"},{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woocommerce_payments:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.0.4","matchCriteriaId":"519111D8-D787-4B95-91F3-9FCFF17723C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woocommerce_payments:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"5.1.0","versionEndExcluding":"5.1.3","matchCriteriaId":"47F55EC1-8DE8-4BB8-9D92-23510CB191FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woocommerce_payments:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"5.2.0","versionEndExcluding":"5.2.2","matchCriteriaId":"0D29E155-A3A0-446A-A414-B3CC66D6450B"},{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woocommerce_payments:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"5.5.0","versionEndExcluding":"5.5.2","matchCriteriaId":"8AF27AE4-B382-4293-9E7A-1A06769DFF1D"},{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woopayments:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"5.6.0","versionEndExcluding":"5.6.2","matchCriteriaId":"AEB22CB8-53ED-4073-ADA9-8C87B4F0176F"},{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woopayments:4.9.0:*:*:*:*:wordpress:*:*","matchCriteriaId":"08275EF1-5695-4CC4-A4B9-8D5429C37DB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woopayments:5.3.0:*:*:*:*:wordpress:*:*","matchCriteriaId":"A4D5E491-B3BB-4D91-9DD6-845A35833F20"},{"vulnerable":true,"criteria":"cpe:2.3:a:automattic:woopayments:5.4.0:*:*:*:*:wordpress:*:*","matchCriteriaId":"0D756027-30C4-443C-8421-62D6EFA8B2C3"}]}]}],"references":[{"url":"https://developer.woocommerce.com/2023/03/23/critical-vulnerability-detected-in-woocommerce-payments-what-you-need-to-know/","source":"support@hackerone.com","tags":["Vendor Advisory"]},{"url":"https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/","source":"support@hackerone.com"},{"url":"https://developer.woocommerce.com/2023/03/23/critical-vulnerability-detected-in-woocommerce-payments-what-you-need-to-know/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}